Re: [Xen-devel] [libvirt] [PATCH V4 1/3] Introduce support for parsing/formatting Xen xl config format

2015-01-13 Thread Eric Blake
On 01/13/2015 04:47 PM, Jim Fehlig wrote: +++ b/src/Makefile.am @@ -1005,6 +1005,10 @@ XENCONFIG_SOURCES = \ xenconfig/xen_common.c xenconfig/xen_common.h \ xenconfig/xen_sxpr.c xenconfig/xen_sxpr.h \

Re: [Xen-devel] [libvirt] [PATCH V4 2/3] tests: Tests for the xen-xl parser

2015-01-13 Thread Jim Fehlig
Eric Blake wrote: On 01/13/2015 08:53 AM, Jim Fehlig wrote: From: Kiarie Kahurani davidkiar...@gmail.com add tests for the xen_xl config parser Signed-off-by: Kiarie Kahurani davidkiar...@gmail.com Signed-off-by: Jim Fehlig jfeh...@suse.com --- V4: Only build xlconfigtest when libxl

Re: [Xen-devel] [RFC V9 2/4] domain snapshot overview

2015-01-13 Thread Chun Yan Liu
On 1/12/2015 at 09:54 PM, in message 1421070890.26317.69.ca...@citrix.com, Ian Campbell ian.campb...@citrix.com wrote: On Mon, 2015-01-12 at 00:01 -0700, Chun Yan Liu wrote: On 1/8/2015 at 08:26 PM, in message 1420719995.19787.62.ca...@citrix.com, Ian Campbell

Re: [Xen-devel] [PATCH Linux-2.6.18] scsifront: avoid aquiring same lock twice if ring is full

2015-01-13 Thread Juergen Gross
On 01/13/2015 07:53 PM, Pasi Kärkkäinen wrote: Hi, On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote: The locking in scsifront_dev_reset_handler() is obviously wrong. In case of a full ring the host lock is aquired twice. Fixing this issue enables to get rid of the endless fo loop

Re: [Xen-devel] [PATCH for-4.6 2/4] xen/arm: vgic: Keep track of vIRQ used by a domain

2015-01-13 Thread Julien Grall
On 13/01/15 16:46, Ian Campbell wrote: We need to track everything for interrupt assignment to a guest/dom0. So if the guest ask for a free vIRQ we can give it directly. Makes sense. In that case you 0/4 mail doesn't fully describe the use case for the series, since it talks about the

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Ed White
On 01/13/2015 12:56 AM, Jan Beulich wrote: On 12.01.15 at 18:36, edmund.h.wh...@intel.com wrote: On 01/12/2015 02:00 AM, Jan Beulich wrote: On 10.01.15 at 00:04, edmund.h.wh...@intel.com wrote: On 01/09/2015 02:41 PM, Andrew Cooper wrote: Having some non-OS part of the guest swap the EPT

Re: [Xen-devel] [PATCH RFC] make error codes a formal part of the ABI

2015-01-13 Thread Ian Jackson
Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the ABI): On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote: There's on small block commented with TBD left in the public header. This is the main reason for the submission being RFC. While we don't currently use

Re: [Xen-devel] [PATCH v3 05/19] libxl: add vmemrange to libxl__domain_build_state

2015-01-13 Thread Ian Jackson
Wei Liu writes ([PATCH v3 05/19] libxl: add vmemrange to libxl__domain_build_state): A vnode consists of one or more vmemranges (virtual memory range). One example of multiple vmemranges is that there is a hole in one vnode. I'm finding this series a bit oddly structured. This patch, for

Re: [Xen-devel] [PATCH v3 18/19] libxlutil: nested list support

2015-01-13 Thread Ian Jackson
Wei Liu writes (Re: [PATCH v3 18/19] libxlutil: nested list support): On Tue, Jan 13, 2015 at 03:52:48PM +, Ian Jackson wrote: This commit message is very brief. For example, under the heading of `Rework internal representation of setting' I would expect a clear description of every

[Xen-devel] [PULL 2/2] xen-hvm: increase maxmem before calling xc_domain_populate_physmap

2015-01-13 Thread Stefano Stabellini
Increase maxmem before calling xc_domain_populate_physmap_exact to avoid the risk of running out of guest memory. This way we can also avoid complex memory calculations in libxl at domain construction time. This patch fixes an abort() when assigning more than 4 NICs to a VM. Signed-off-by:

[Xen-devel] [PULL 1/2] xen-pt: Fix PCI devices re-attach failed

2015-01-13 Thread Stefano Stabellini
From: Liang Li liang.z...@intel.com Use the 'xl pci-attach $DomU $BDF' command to attach more than one PCI devices to the guest, then detach the devices with 'xl pci-detach $DomU $BDF', after that, re-attach these PCI devices again, an error message will be reported like following: libxl:

[Xen-devel] [PATCHv1 0/3 net-next] xen-netfront: refactor making Tx requests

2015-01-13 Thread David Vrabel
As netfront as evolved to handle different sorts of skbs the code to fill a Tx requests has been copy and pasted several times. The series refactors this and a few other areas. The first patch is to a Xen header but this can be merged via net-next. David

[Xen-devel] [PATCH 2/3] xen-netfront: refactor skb slot counting

2015-01-13 Thread David Vrabel
A function to count the number of slots an skb needs is more useful than one that counts the slots needed for only the frags. Signed-off-by: David Vrabel david.vra...@citrix.com --- drivers/net/xen-netfront.c | 13 +++-- 1 file changed, 7 insertions(+), 6 deletions(-) diff --git

Re: [Xen-devel] [PATCH v3 00/24] xen/arm: Add support for non-pci passthrough

2015-01-13 Thread Julien Grall
On 13/01/15 14:25, Julien Grall wrote: This series has been tested on Midway by assigning the secondary network card to a guest (see instruction below). I plan to do futher testing on other boards. I forgot to precise that only changes has only been build tested on x86. Regards, -- Julien

[Xen-devel] [PATCH 0/2] xen/arm: Misc for grant-table

2015-01-13 Thread Julien Grall
Hi all, This series contains a couple of change for the grant-table header. The first one only removed an unused/misplaced define. The second one, increase the number of grant frame iniatialize when the domain is created. Regards, Julien Grall (2): xen/arm: Remove the define INVALID_GFN from

Re: [Xen-devel] [PATCH RFC] make error codes a formal part of the ABI

2015-01-13 Thread Jan Beulich
On 13.01.15 at 17:57, ian.jack...@eu.citrix.com wrote: Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the ABI): On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote: There's on small block commented with TBD left in the public header. This is the main reason for

Re: [Xen-devel] [PATCH v3 07/19] libxl: x86: factor out e820_host_sanitize

2015-01-13 Thread Ian Jackson
Wei Liu writes ([PATCH v3 07/19] libxl: x86: factor out e820_host_sanitize): This function gets the machine E820 map and sanitize it according to PV guest configuration. This will be used in later patch. No functional change introduced in this patch. Thanks. It is easy to see that this is

Re: [Xen-devel] [PATCH RFC] make error codes a formal part of the ABI

2015-01-13 Thread Ian Campbell
On Tue, 2015-01-13 at 16:57 +, Ian Jackson wrote: Ian Campbell writes (Re: [PATCH RFC] make error codes a formal part of the ABI): On Tue, 2015-01-13 at 16:21 +, Jan Beulich wrote: There's on small block commented with TBD left in the public header. This is the main reason for

Re: [Xen-devel] [PATCH for-4.6 2/4] xen/arm: vgic: Keep track of vIRQ used by a domain

2015-01-13 Thread Ian Campbell
On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote: (CC Jan) I think you forget, I added him. @@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d) { d-arch.phys_timer_base.offset = NOW(); d-arch.virt_timer_base.offset = READ_SYSREG64(CNTPCT_EL0); + +/* At

[Xen-devel] [PATCH 3/3] xen-netfront: refactor making Tx requests

2015-01-13 Thread David Vrabel
Eliminate all the duplicate code for making Tx requests by consolidating them into a single xennet_make_one_txreq() function. xennet_make_one_txreq() and xennet_make_txreqs() work with pages and offsets so it will be easier to make netfront handle highmem frags in the future. Signed-off-by:

[Xen-devel] [PATCH 1/3] xen: add page_to_mfn()

2015-01-13 Thread David Vrabel
pfn_to_mfn(page_to_pfn(p)) is a common use case so add a generic helper for it. Signed-off-by: David Vrabel david.vra...@citrix.com --- include/xen/page.h |5 + 1 file changed, 5 insertions(+) diff --git a/include/xen/page.h b/include/xen/page.h index 12765b6..c5ed20b 100644 ---

Re: [Xen-devel] [PATCH v3 03/19] libxc: allocate memory with vNUMA information for PV guest

2015-01-13 Thread Ian Jackson
Wei Liu writes ([PATCH v3 03/19] libxc: allocate memory with vNUMA information for PV guest): ... diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h index 07d7224..c459e77 100644 --- a/tools/libxc/include/xc_dom.h +++ b/tools/libxc/include/xc_dom.h @@ -167,6 +167,11 @@

Re: [Xen-devel] [PATCH for-4.6 2/4] xen/arm: vgic: Keep track of vIRQ used by a domain

2015-01-13 Thread Julien Grall
On 13/01/15 16:57, Julien Grall wrote: (CC Jan) Forgot to really CC Jan for the bool stuff. Hi Ian, On 13/01/15 16:46, Ian Campbell wrote: vgic_reserve_irq returns a boolean: Please use true/false then. In Xen we have xen/stdbool.h which differs from normal stdboot.h. I'm not sure

Re: [Xen-devel] [PATCH v3 12/19] hvmloader: retrieve vNUMA information from hypervisor

2015-01-13 Thread Wei Liu
On Tue, Jan 13, 2015 at 04:50:11PM +, Jan Beulich wrote: On 13.01.15 at 13:11, wei.l...@citrix.com wrote: +void init_vnuma_info(void) +{ +int rc, retry = 0; +struct xen_vnuma_topology_info vnuma_topo; + +vcpu_to_vnode = scratch_alloc(sizeof(uint32_t) *

Re: [Xen-devel] [PATCH v3 05/19] libxl: add vmemrange to libxl__domain_build_state

2015-01-13 Thread Wei Liu
On Tue, Jan 13, 2015 at 05:02:10PM +, Ian Jackson wrote: Wei Liu writes ([PATCH v3 05/19] libxl: add vmemrange to libxl__domain_build_state): A vnode consists of one or more vmemranges (virtual memory range). One example of multiple vmemranges is that there is a hole in one vnode.

Re: [Xen-devel] [PATCH for-4.6 2/4] xen/arm: vgic: Keep track of vIRQ used by a domain

2015-01-13 Thread Julien Grall
On 13/01/15 17:18, Ian Campbell wrote: On Tue, 2015-01-13 at 16:57 +, Julien Grall wrote: (CC Jan) I think you forget, I added him. @@ -49,6 +49,21 @@ int domain_vtimer_init(struct domain *d) { d-arch.phys_timer_base.offset = NOW(); d-arch.virt_timer_base.offset =

Re: [Xen-devel] [PATCH v3 03/19] libxc: allocate memory with vNUMA information for PV guest

2015-01-13 Thread Wei Liu
On Tue, Jan 13, 2015 at 05:05:26PM +, Ian Jackson wrote: Wei Liu writes ([PATCH v3 03/19] libxc: allocate memory with vNUMA information for PV guest): ... diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h index 07d7224..c459e77 100644 ---

Re: [Xen-devel] [PATCH for 2.3 v2 1/1] xen-hvm: increase maxmem before calling xc_domain_populate_physmap

2015-01-13 Thread Stefano Stabellini
On Mon, 12 Jan 2015, Stefano Stabellini wrote: On Wed, 3 Dec 2014, Don Slutz wrote: From: Stefano Stabellini stefano.stabell...@eu.citrix.com Increase maxmem before calling xc_domain_populate_physmap_exact to avoid the risk of running out of guest memory. This way we can also avoid

Re: [Xen-devel] [PATCH v3 15/19] libxc: allocate memory with vNUMA information for HVM guest

2015-01-13 Thread Konrad Rzeszutek Wilk
On Tue, Jan 13, 2015 at 12:11:43PM +, Wei Liu wrote: The algorithm is more or less the same as the one used for PV guest. Libxc gets hold of the mapping of vnode to pnode and size of each vnode then allocate memory accordingly. Could you split this patch in two? One part for the adding of

Re: [Xen-devel] [PATCH v3 08/19] libxl: functions to build vmemranges for PV guest

2015-01-13 Thread Ian Jackson
Wei Liu writes ([PATCH v3 08/19] libxl: functions to build vmemranges for PV guest): Introduce a arch-independent routine to generate one vmemrange per vnode. Also introduce arch-dependent routines for different architectures because part of the process is arch-specific -- ARM has yet have

Re: [Xen-devel] [PATCH 02/11] VMX: implement suppress #VE.

2015-01-13 Thread Ed White
On 01/12/2015 09:45 AM, Ed White wrote: On 01/12/2015 08:43 AM, Andrew Cooper wrote: On 09/01/15 21:26, Ed White wrote: In preparation for selectively enabling hardware #VE in a later patch, set suppress #VE on all EPTE's on #VE-capable hardware. Suppress #VE should always be the default

Re: [Xen-devel] [PATCH v3 00/14] Enable vTPM subsystem on TPM 2.0

2015-01-13 Thread Xu, Quan
-Original Message- From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov] Sent: Tuesday, January 13, 2015 11:54 PM To: Xu, Quan; xen-devel@lists.xen.org Cc: stefano.stabell...@eu.citrix.com; samuel.thiba...@ens-lyon.org; ian.campb...@citrix.com; ian.jack...@eu.citrix.com;

Re: [Xen-devel] [Xen-users] [TestDay] minor bug + possible configuration bug 4.5rc4 archlinux

2015-01-13 Thread Olaf Hering
On Tue, Jan 13, Doug McMillan wrote: Also quick question if I am understanding my remaining issue [tmpfs: Bad mount option context] as described by a previous thread. Until the code that generates it changes I need to manually change var-lib-xenstored.mount from ... Or am I misunderstanding

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-13 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, January 14, 2015 12:06 AM On 13.01.15 at 17:00, george.dun...@eu.citrix.com wrote: Another option I was thinking about: Before assigning a device to a guest, you have to unplug the device and assign it to pci-back (e.g.,

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Jan Beulich
Ed White edmund.h.wh...@intel.com 01/13/15 9:03 PM On 01/13/2015 11:01 AM, Andrew Cooper wrote: One thing I have noticed while looking at the #VE stuff that EPT also supports A/D tracking, which might be quite a nice optimisation and forgo the need for p2m_ram_logdirty, but I think this

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Jan Beulich
Ed White edmund.h.wh...@intel.com 01/13/15 10:32 PM On 01/13/2015 12:45 PM, Andrew Cooper wrote: On 13/01/15 20:02, Ed White wrote: The set of mfn's is the same, but I do allow gfn-mfn mappings to be modified under certain circumstances. One use of this is to point the same VA to different

Re: [Xen-devel] [CALL-FOR-AGENDA] Monthly Xen.org Technical Call (2015-01-14)

2015-01-13 Thread Ian Campbell
On Wed, 2015-01-07 at 15:32 +, Ian Campbell wrote: The first Xen technical call will be at: Wed 14 Jan 17:00:00 GMT 201 `date -d @1421254800` See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html for more information on the call. In the absence of any further

Re: [Xen-devel] [PATCH v3 03/19] libxc: allocate memory with vNUMA information for PV guest

2015-01-13 Thread Andrew Cooper
On 13/01/15 12:11, Wei Liu wrote: From libxc's point of view, it only needs to know vnode to pnode mapping and size of each vnode to allocate memory accordingly. Add these fields to xc_dom structure. The caller might not pass in vNUMA information. In that case, a dummy layout is generated

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Ed White
On 01/13/2015 11:01 AM, Andrew Cooper wrote: On 09/01/15 21:26, Ed White wrote: This set of patches adds support to hvm domains for EPTP switching by creating multiple copies of the host p2m (currently limited to 10 copies). The primary use of this capability is expected to be in scenarios

Re: [Xen-devel] [PATCH Linux-2.6.18] scsifront: avoid aquiring same lock twice if ring is full

2015-01-13 Thread Pasi Kärkkäinen
Hi, On Tue, Jan 13, 2015 at 05:22:58PM +0100, Juergen Gross wrote: The locking in scsifront_dev_reset_handler() is obviously wrong. In case of a full ring the host lock is aquired twice. Fixing this issue enables to get rid of the endless fo loop with an explicit break statement. Is this

Re: [Xen-devel] [PATCH v2 2/2] x86, arm, platform, xen, kconfig: add xen defconfig helper

2015-01-13 Thread Luis R. Rodriguez
On Mon, Dec 15, 2014 at 02:58:26PM +, Stefano Stabellini wrote: On Tue, 9 Dec 2014, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com This lets you build a kernel which can support xen dom0 or xen guests by just using: make xenconfig on both x86 and arm64

[Xen-devel] --enable-xsm ?

2015-01-13 Thread Konrad Rzeszutek Wilk
Hey I was wondering if there would be any plans for configure.ac (or the m4 scripts) to have an --enable-xsm which would set XSM_ENABLE (or FLASK_ENABLE) to true? Right now by default to build with XSM one has to manually change the Config.mk ENABLE_XSM option to 'y'. Thanks.

Re: [Xen-devel] [PATCH 04/11] x86/MM: Improve p2m type checks.

2015-01-13 Thread Ed White
On 01/12/2015 09:48 AM, Andrew Cooper wrote: On 09/01/15 21:26, Ed White wrote: diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h index 5f7fe71..8193901 100644 --- a/xen/include/asm-x86/p2m.h +++ b/xen/include/asm-x86/p2m.h @@ -193,6 +193,9 @@ struct p2m_domain { *

[Xen-devel] [PATCH] xen/arm: Blacklist the memory mapped timer (armv7-timer-mem)

2015-01-13 Thread Julien Grall
Some platform (such as the VFP Base AEMv8 model) has a memory mapped timer. We don't want DOM0 use this timer rather than the generic ARM timer. So blacklist it for all platforms. Signed-off-by: Julien Grall julien.gr...@linaro.org --- This patch is candidate to backport for Xen 4.5 and Xen

Re: [Xen-devel] [PATCH v2 2/2] x86, arm, platform, xen, kconfig: add xen defconfig helper

2015-01-13 Thread Julien Grall
Hello Luis, On 13/01/15 19:03, Luis R. Rodriguez wrote: diff --git a/kernel/configs/xen.config b/kernel/configs/xen.config new file mode 100644 index 000..d2ec010 --- /dev/null +++ b/kernel/configs/xen.config @@ -0,0 +1,30 @@ +# generic config +CONFIG_XEN=y +CONFIG_XEN_DOM0=y

Re: [Xen-devel] [PATCH v3 01/19] xen: dump vNUMA information with debug key u

2015-01-13 Thread Andrew Cooper
On 13/01/15 12:11, Wei Liu wrote: @@ -408,6 +413,49 @@ static void dump_numa(unsigned char key) for_each_online_node ( i ) printk(Node %u: %u\n, i, page_num_node[i]); + +if ( !d-vnuma ) +continue; Nit - extraneous whitespace. + +

Re: [Xen-devel] [PULL 0/2] Xen tree 2015-01-13

2015-01-13 Thread Peter Maydell
On 13 January 2015 at 18:24, Stefano Stabellini stefano.stabell...@eu.citrix.com wrote: The following changes since commit 7d5ad15d17f26dd4f9ff5f3491828bc34e74f28c: Merge remote-tracking branch 'remotes/stefanha/tags/net-pull-request' into staging (2015-01-12 11:13:24 +) are available

Re: [Xen-devel] Architecture for dom0 integrity measurements.

2015-01-13 Thread Dr. Greg Wettstein
On Jan 12, 3:53pm, Xu, Quan wrote: } Subject: RE: [Xen-devel] Architecture for dom0 integrity measurements. Hi, Dr. G.W. Wettstein Hi Quan, thanks for taking the time to reply. cc Graaf who is vTPM / XSM maintainer. Also cc Stefano. Greetings to everyone else as well. -Original

Re: [Xen-devel] [PATCH v3 4/5] tools: code refactoring for MBM

2015-01-13 Thread Chao Peng
On Tue, Jan 13, 2015 at 01:46:50PM +, Wei Liu wrote: On Tue, Jan 13, 2015 at 04:02:12PM +0800, Chao Peng wrote: Make some internal routines common so that total/local memory bandwidth monitoring in the next patch can make use of them. Signed-off-by: Chao Peng

[Xen-devel] Question about partitioning shared cache in Xen

2015-01-13 Thread Meng Xu
Hi, [Goal] I want to investigate the impact of the shared cache on the performance of workload in guest domain. I also want to partition the shared cache via page coloring mechanism so that guest domains can use different cache colors of shared cache and will not have interference in the shared

Re: [Xen-devel] [PATCH v2] [Bugfix] x86/apic: Fix xen IRQ allocation failure caused by commit b81975eade8c

2015-01-13 Thread Thomas Gleixner
On Tue, 13 Jan 2015, Sander Eikelenboom wrote: Monday, January 12, 2015, 4:01:00 PM, you wrote: On 12/01/15 13:39, Jiang Liu wrote: Commit b81975eade8c (x86, irq: Clean up irqdomain transition code) breaks xen IRQ allocation because xen_smp_prepare_cpus() doesn't invoke

Re: [Xen-devel] [Xen-users] [TestDay] minor bug + possible configuration bug 4.5rc4 archlinux

2015-01-13 Thread Olaf Hering
On Mon, Jan 12, Ian Campbell wrote: @devs -- we obviously need to do something about this (too late for 4.5, but for 4.6 + backport). Perhaps there is some alternative systemd construction which disassociates the actual path from the abstract service xenstored dir mounted? I dont think we

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Jan Beulich
On 12.01.15 at 18:36, edmund.h.wh...@intel.com wrote: On 01/12/2015 02:00 AM, Jan Beulich wrote: On 10.01.15 at 00:04, edmund.h.wh...@intel.com wrote: On 01/09/2015 02:41 PM, Andrew Cooper wrote: Having some non-OS part of the guest swap the EPT tables and accidentally turn a DMA buffer

[Xen-devel] [PATCH v3 5/5] tools: add total/local memory bandwith monitoring

2015-01-13 Thread Chao Peng
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring are supported: total and local memory bandwidth monitoring. To use it, CMT should be enabled in hypervisor. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com --- docs/man/xl.pod.1 |9 +

[Xen-devel] [PATCH v3 4/5] tools: code refactoring for MBM

2015-01-13 Thread Chao Peng
Make some internal routines common so that total/local memory bandwidth monitoring in the next patch can make use of them. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com --- tools/libxl/libxl_psr.c | 44 - tools/libxl/xl_cmdimpl.c | 54

[Xen-devel] [PATCH v3 1/5] x86: expose CMT L3 event mask to user space

2015-01-13 Thread Chao Peng
L3 event mask indicates the event types supported in host, including cache occupancy event as well as local/total memory bandwidth events for Memory Bandwidth Monitoring(MBM). Expose it so all these events can be monitored in user space. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com

[Xen-devel] [PATCH v3 3/5] tools: correct coding style for psr

2015-01-13 Thread Chao Peng
- space: remove space after '(' or before ')' in 'if' condition; - indention: align function definition/call arguments; Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Acked-by: Wei Liu wei.l...@citrix.com --- tools/libxc/include/xenctrl.h |8 tools/libxc/xc_psr.c |

[Xen-devel] [PATCH v3 0/5] enable Memory Bandwidth Monitoring (MBM) for VMs

2015-01-13 Thread Chao Peng
Changes from v2: * Remove the usage of static to cache data in xc; NOTE: Other places that already existed before are not touched due to the needs for API change. Will fix in separate patch if desirable. * Coding style; Changes from v1: * Move event type check from xc to xl; * Add retry

[Xen-devel] [PATCH v3 2/5] tools: add routine to get CMT L3 event mask

2015-01-13 Thread Chao Peng
This is the tools side wrapper for XEN_SYSCTL_PSR_CMT_get_l3_event_mask of XEN_SYSCTL_psr_cmt_op. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com --- tools/libxc/include/xenctrl.h |1 + tools/libxc/xc_psr.c | 17 + tools/libxl/libxl.h |1 +

[Xen-devel] [PATCH] xen-time: decreasing the rating of the xen clocksource below that of the tsc clocksource for dom0's

2015-01-13 Thread Imre Palik
From: Palik, Imre im...@amazon.de In Dom0's the use of the TSC clocksource (whenever it is stable enough to be used) instead of the Xen clocksource should not cause any issues, as Dom0 VMs never live-migrated. The TSC clocksource is somewhat more efficient than the Xen paravirtualised

[Xen-devel] [libvirt test] 33382: regressions - FAIL

2015-01-13 Thread xen . org
flight 33382 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33382/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 5 libvirt-build fail REGR. vs. 32648 build-i386-libvirt

Re: [Xen-devel] Fwd: [OPW PATCH 1/4] tools/xl: Calling _init and _dispose function for libxl types

2015-01-13 Thread Uma Sharma
There was no v2 (v2 was not created properly). Yes, 1/4 was the cover letter. And 4/4 was not correct. Thank you for applying the patches. On Mon, Jan 12, 2015 at 11:29 PM, Ian Campbell ian.campb...@citrix.com wrote: On Tue, 2014-10-21 at 18:04 +0100, George Dunlap wrote: Just getting back to

[Xen-devel] [linux-linus test] 33377: regressions - FAIL

2015-01-13 Thread xen . org
flight 33377 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33377/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-intel 5 xen-boot fail REGR. vs. 32879

Re: [Xen-devel] [PATCH v5 7/9] libxc: introduce soft reset for HVM domains

2015-01-13 Thread Ian Campbell
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote: Add new xc_domain_soft_reset() function which performs so-called 'soft reset' for an HVM domain. It is being performed in the following way: - Save HVM context and all HVM params; - Devour original domain with XEN_DOMCTL_devour; -

Re: [Xen-devel] [PATCH 01/10] xen/arm: Implement hip04-d01 platform

2015-01-13 Thread Frediano Ziglio
2015-01-13 11:58 GMT+00:00 Ian Campbell ian.campb...@citrix.com: On Mon, 2014-11-03 at 10:11 +, Frediano Ziglio wrote: Add this new platform to Xen. This platform require specific code to initialize CPUs. What is the bootwrapper? Are you running this on real silicon or on an emulator?

Re: [Xen-devel] [PATCH v5 8/9] libxl: soft reset support

2015-01-13 Thread Ian Campbell
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote: Supported for HVM guests only. Is it specifically PVHVM guests, or are unaware HVM guests also supported? (I think the answer is that an unaware HVM guest has no way to trigger a soft reset, so maybe it's moot...) diff --git

[Xen-devel] [PATCH v3 06/24] xen/arm: Map disabled device in DOM0

2015-01-13 Thread Julien Grall
The check to avoid mapping disabled device in DOM0 was added in the anticipation of the device passthrough. But, a brand new property will be added later to mark device which will passthrough. At the same time, remove the memory type check because those nodes has been blacklisted. Futhermore,

[Xen-devel] [PATCH v3 12/24] xen/arm: Release IRQ routed to a domain when it's destroying

2015-01-13 Thread Julien Grall
Xen has to release IRQ routed to a domain in order to reuse later. Currently only SPIs can be routed to the guest so we only need to browse SPIs for a specific domain. Futhermore, a guest can crash and let the IRQ in an incorrect state (i.e has not being EOIed). Xen will have to reset the IRQ in

[Xen-devel] [PATCH v3 03/24] xen/dts: Allow only IRQ translation that are mapped to main GIC

2015-01-13 Thread Julien Grall
Xen is only able to handle one GIC controller. Some platform may contain other interrupt controller. Make sure to only translate IRQ mapped into the GIC handled by Xen. Signed-off-by: Julien Grall julien.gr...@linaro.org --- Changes in v3: - Patch was previously sent a separate

[Xen-devel] [PATCH v3 08/24] xen/arm: Allow virq != irq

2015-01-13 Thread Julien Grall
Actually Xen is assuming that the virtual IRQ will always be the same as IRQ. Modify route_guest_irq to take the virtual IRQ in parameter and let Xen assign a different IRQ number. Also store the vIRQ in the desc action to easily retrieve easily the IRQ target when we need to inject the

[Xen-devel] [PATCH v3 11/24] xen/arm: Let the toolstack configure the number of SPIs

2015-01-13 Thread Julien Grall
Each domain may have a different number of IRQs depending on the devices assigned to it. Rather re-using the number of IRQs used by the hardwared GIC, let the toolstack specify the number of SPIs when the domain is created. This will avoid to waste memory. To calculate the number of SPIs, we

[Xen-devel] [PATCH v3 21/24] tools/(lib)xl: Add partial device tree support for ARM

2015-01-13 Thread Julien Grall
Let the user to pass additional nodes to the guest device tree. For this purpose, everything in the node /passthrough from the partial device tree will be copied into the guest device tree. The node /aliases will be also copied to allow the user to define aliases which can be used by the guest

[Xen-devel] [PATCH v3 00/24] xen/arm: Add support for non-pci passthrough

2015-01-13 Thread Julien Grall
Hello all, This is the third version of this patch series to add support for platform device passthrough on ARM. Compare to the previous version [1], the automatic mapping of MMIO/IRQ and the generation of the device tree has been dropped. Instead the user will have to: - Map manually

[Xen-devel] [PATCH v3 04/24] xen: guestcopy: Provide an helper to safely copy string from guest

2015-01-13 Thread Julien Grall
Flask code already provides an helper to copy a string from guest. In a later patch, the new DT hypercalls will need a similar function. To avoid code duplication, copy the flask helper (flask_copying_string) to common code: - Rename into safe_copy_string_from_guest - Add comment to

[Xen-devel] [PATCH v3 16/24] xen/passthrough: Introduce iommu_construct

2015-01-13 Thread Julien Grall
This new function will correctly initialize the IOMMU page table for the current domain. Also use it in iommu_assign_dt_device even though the current IOMMU implementation on ARM shares P2M with the processor. Signed-off-by: Julien Grall julien.gr...@linaro.org Cc: Jan Beulich jbeul...@suse.com

[Xen-devel] [PATCH v3 09/24] xen/arm: route_irq_to_guest: Check validity of the IRQ

2015-01-13 Thread Julien Grall
Currently Xen only supports SPIs routing for guest, add a function is_assignable_irq to check if we can assign a given IRQ to the guest. Secondly, make sure the vIRQ is not the greater that the number of IRQs handle to the vGIC and it's an SPIs. Thirdly, when the IRQ is already assigned to the

[Xen-devel] [PATCH v3 05/24] xen/arm: vgic: Introduce a function to initialize pending_irq

2015-01-13 Thread Julien Grall
The structure pending_irq is initialized on the same way in 2 differents place. Introduce vgic_init_pending_irq to avoid code duplication. Also move the setting of the irq field in this function as we need to initialize it once rather than every time an IRQ is injected to the guest. Finally, use

Re: [Xen-devel] [PATCH 01/10] xen/arm: Implement hip04-d01 platform

2015-01-13 Thread Ian Campbell
On Tue, 2015-01-13 at 14:09 +, Frediano Ziglio wrote: 2015-01-13 11:58 GMT+00:00 Ian Campbell ian.campb...@citrix.com: On Mon, 2014-11-03 at 10:11 +, Frediano Ziglio wrote: Add this new platform to Xen. This platform require specific code to initialize CPUs. What is the

Re: [Xen-devel] [PATCH 08/14] xen-netback: use foreign page information from the pages themselves

2015-01-13 Thread David Vrabel
On 12/01/15 15:43, David Vrabel wrote: From: Jenny Herbert jenny.herb...@citrix.com Use the foreign page flag in netback to get the domid and grant ref needed for the grant copy. This signficiantly simplifies the netback code and makes netback work with foreign pages from other backends

Re: [Xen-devel] [PATCH v3 5/5] tools: add total/local memory bandwith monitoring

2015-01-13 Thread Wei Liu
On Tue, Jan 13, 2015 at 04:02:13PM +0800, Chao Peng wrote: Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring are supported: total and local memory bandwidth monitoring. To use it, CMT should be enabled in hypervisor. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com

Re: [Xen-devel] [PATCH v5 6/9] libxl: add libxl__domain_soft_reset_destroy()

2015-01-13 Thread Ian Campbell
On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote: New libxl__domain_soft_reset_destroy() is an internal-only version of libxl_domain_destroy() which follows the same domain destroy path with the only difference: xc_domain_destroy() is being avoided so the domain is not actually being

Re: [Xen-devel] [PATCH] libxl: provide xenlight.pc

2015-01-13 Thread Ian Campbell
On Tue, 2015-01-13 at 12:56 +, Wei Liu wrote: On Tue, Jan 13, 2015 at 01:19:05PM +0100, Olaf Hering wrote: On Tue, Jan 13, Ian Campbell wrote: On Fri, 2015-01-09 at 14:32 +, Wei Liu wrote: A pkg-config file for libxl. It also contains two variables (xenfirmwaredir and

[Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-01-13 Thread Julien Grall
TODO: Update the commit message A device node is described by a path. It will be used to retrieved the node in the device tree and assign the related device to the domain. Only device protected by an IOMMU can be assigned to a guest. Signed-off-by: Julien Grall julien.gr...@linaro.org Cc: Ian

Re: [Xen-devel] [PATCH v5 4/9] xen: introduce XEN_DOMCTL_devour

2015-01-13 Thread Tim Deegan
At 13:53 + on 13 Jan (1421153637), Ian Campbell wrote: On Thu, 2014-12-11 at 14:45 +0100, Vitaly Kuznetsov wrote: +gmfn = mfn_to_gmfn(d, mfn); (I haven't thought about it super hard, but I'm taking it as given that this approach to kexec is going to be needed for ARM too,

[Xen-devel] [RFC PATCHv1 net-next] xen-netback: always fully coalesce guest Rx packets

2015-01-13 Thread David Vrabel
Always fully coalesce guest Rx packets into the minimum number of ring slots. Reducing the number of slots per packet has significant performance benefits (e.g., 7.2 Gbit/s to 11 Gbit/s in an off-host receive test). However, this does increase the number of grant ops per packet which decreases

[Xen-devel] [seabios test] 33391: tolerable FAIL - PUSHED

2015-01-13 Thread xen . org
flight 33391 seabios real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33391/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pvh-intel 9 guest-start fail never pass test-amd64-i386-libvirt 9

Re: [Xen-devel] [OSSTEST PATCH] make-flight: reorganize scheduling related test jobs

2015-01-13 Thread Dario Faggioli
On Mon, 2015-01-12 at 16:52 +, Ian Jackson wrote: Dario Faggioli writes ([OSSTEST PATCH] make-flight: reorganize scheduling related test jobs): Scheduling related tests are ok to run on ARM, so do not cut them off. They also do not depend on a particular Dom0 architecture. The

[Xen-devel] [PATCH v3 13/24] xen/arm: Implement hypercall PHYSDEVOP_{, un}map_pirq

2015-01-13 Thread Julien Grall
The physdev sub-hypercalls PHYSDEVOP_{,map}_pirq allow the toolstack to assign/deassign a physical IRQ to the guest (via the config options irqs for xl). The x86 version is using them with PIRQ (IRQ bound to an event channel). As ARM doesn't have a such concept, we could reuse it to bound a

[Xen-devel] [PATCH v3 01/24] xen: Extend DOMCTL createdomain to support arch configuration

2015-01-13 Thread Julien Grall
On ARM the virtual GIC may differ between each guest (emulated GIC version, number of SPIs...). Those informations are already known at the domain creation and can never change. For now only the gic_version is set. In long run, there will be more parameters such as the number of SPIs. All will be

[Xen-devel] [PATCH v3 19/24] xen/iommu: arm: Wire iommu DOMCTL for ARM

2015-01-13 Thread Julien Grall
Signed-off-by: Julien Grall julien.gr...@linaro.org Acked-by: Stefano Stabellini stefano.stabell...@eu.citrix.com Cc: Jan Beulich jbeul...@suse.com --- Changes in v3: - Add Stefano's ack Changes in v2: - Don't move the call in common code. --- xen/arch/arm/domctl.c | 11

[Xen-devel] [PATCH v3 02/24] xen/arm: Divide GIC initialization in 2 parts

2015-01-13 Thread Julien Grall
Currently the function to translate IRQ from the device tree is set unconditionally to be able to be able to retrieve serial/timer IRQ before the GIC has been initialized. It assumes that the xlate function won't never changed. We may also need to have the primary interrupt controller very

[Xen-devel] [PATCH v3 24/24] xl: Add new option dtdev

2015-01-13 Thread Julien Grall
The option dtdev will be used to passthrough a non-PCI device described in the device tree to a guest. Signed-off-by: Julien Grall julien.gr...@linaro.org Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Wei Liu wei.l...@citrix.com --- Changes in v2: - libxl_device_dt has been rename to

[Xen-devel] [PATCH v3 22/24] tools/libxl: arm: Use an higher value for the GIC phandle

2015-01-13 Thread Julien Grall
The partial device tree may contains phandle. The Device Tree Compiler tends to allocate the phandle from 1. Reserve the ID 65000 for the GIC phandle. I think we can safely assume that the partial device tree will never contain a such ID. Signed-off-by: Julien Grall julien.gr...@linaro.org Cc:

[Xen-devel] [PATCH v3 17/24] xen/passthrough: arm: release earlier the DT devices assigned to a guest

2015-01-13 Thread Julien Grall
The toolstack may not have deassign every device used by a guest. Therefore we have to go through the device list and removing them before asking the IOMMU drivers to release memory for this domain. This can be done by moving the call to the release function when we relinquish the resources. The

Re: [Xen-devel] [RFC PATCHv1 net-next] xen-netback: always fully coalesce guest Rx packets

2015-01-13 Thread Wei Liu
On Tue, Jan 13, 2015 at 02:05:17PM +, David Vrabel wrote: Always fully coalesce guest Rx packets into the minimum number of ring slots. Reducing the number of slots per packet has significant performance benefits (e.g., 7.2 Gbit/s to 11 Gbit/s in an off-host receive test). Good number.

Re: [Xen-devel] [PATCH v2] tools/Rules.mk: Don't optimize debug builds; add macro debugging information

2015-01-13 Thread Ian Campbell
On Tue, 2015-01-13 at 13:52 +0800, Wen Congyang wrote: On 12/01/2014 10:21 PM, Euan Harris wrote: Tools debug builds are built with optimization level -O1, inherited from the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger, and the comment justifying -O1 in StdGNU.mk

Re: [Xen-devel] [PATCH v3 1/5] x86: expose CMT L3 event mask to user space

2015-01-13 Thread Chao Peng
On Tue, Jan 13, 2015 at 10:00:58AM +, Jan Beulich wrote: On 13.01.15 at 09:02, chao.p.p...@linux.intel.com wrote: L3 event mask indicates the event types supported in host, including cache occupancy event as well as local/total memory bandwidth events for Memory Bandwidth

[Xen-devel] [PATCH v1 1/2] tools: unhook blktap1 from the build and remove all references to it

2015-01-13 Thread Ian Campbell
This was disabled by default in Xen 4.4. Since xend has now been removed from the tree I don't believe anything is using it. We need to pass an explicit CONFIG_BLKTAP1=n to qemu-xen-traditional otherwise it defaults to y and doesn't build. This patch does all the ground work, the tools/blktap

[Xen-devel] [PATCH v2 2/2] tools: remove blktap1

2015-01-13 Thread Ian Campbell
Now that it is unhooked we can just remove it. Signed-off-by: Ian Campbell ian.campb...@citrix.com --- .gitignore |5 - .hgignore |5 - tools/blktap/Makefile | 13 - tools/blktap/README |

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-13 Thread Ian Jackson
Ed White writes (Re: [PATCH 00/11] Alternate p2m: support multiple copies of host p2m): On 01/12/2015 10:00 AM, Ian Jackson wrote: To support this code in-tree, I think we will need Open Source code for exercising it, surely ? I'm hoping that, as Andrew says, there will be people

  1   2   3   >